In the fast-developing cyber insurance marketplace, insurers have closely considered the possible risks and have analyzed the potential aggregation of such risks. While not the only topics of interest to insurers, these two...more

The Federal Aviation Administration (FAA) reports that, as of July 9, 2015, it has granted 746 Petitions for Exemption under Section 333 of the FAA Modernization and Reform Act of 2012 authorizing commercial operations with...more

On June 12, 2015, the German Parliament (Deutscher Bundestag) passed an Act to Improve the Security of Information Technology Systems ("IT-Security Act"). The new legislation requires operators of so-called critical...more

It has been reported that a wind turbine which is deployed across the energy sector worldwide has been hacked. Due to a software bug, an attacker can get the user name and password from the browser. This can allow admin...more

Going With The (Work) Flow After A Data Breach—Corporate Counsel reported on the recent King & Spalding webinar, “Data Breach: What Workflows to Expect and How to Prepare,” offering concerned in-house counsel and the...more

The Energy Market Reform Working Group (Working Group) in Australia released a consultation paper at the end of 2014 regarding the regulatory implications of new products and services in the national electricity market. New...more

On January 20, 2015, President Obama delivered his sixth State of the Union address, during which he pressed for Congress to take action to combat cybersecurity threats. He called on Congress to “finally pass the legislation...more

During his recent State of the Union address, President Obama called on Congress “to finally pass the legislation we need to better meet the evolving threat of cyber attacks, combat identity theft, and protect our children’s...more

Nowadays, the European energy world is facing a revolution. European utilities have underperformed the broader European equity market by 80 per cent since the start of 2009. They are all trying to transform themselves from...more

On July 28, 2014, the House of Representatives passed three bills aimed at enhancing the cybersecurity efforts of the Department of Homeland Security (DHS) in certain critical infrastructure sectors, including the energy...more

In response to the growing threat from cyber-attacks, the oil and gas industry has announced the formation of an information sharing clearinghouse. The new group, known as the Oil and Natural Gas Information Sharing and...more

In a Federal Register notice to be officially published Friday, June 20, 2014, the Department of Energy (DOE) is inviting public participation in its efforts to develop a guidance document entitled “Energy Sector Framework...more

The growth of business opportunities in the Bakken region is impressive and looks to continue on an upward trajectory for years to come. Companies that might have been small—or non-existent—just 5 years ago are growing at a...more

Today, the U.S. Senate Committee on Energy and Natural Resources held a standing-room only hearing titled “Keeping the lights on — Are we doing enough to ensure the reliability and security of the U.S. electric grid?” While...more

The federal government’s long-awaited Cybersecurity Framework offers promising tools for energy companies to manage their cybersecurity risk, but leaves many questions unanswered. The National Institute of Standards and...more

In the New Year, one of the trade secret trends we’re watching is the ongoing tension between a company’s interest in preserving its proprietary information and the public’s demand to know more about the goods or services it...more

After a brief August hiatus, Privacy Monday is back with privacy goofs, gaffes and tidbits to start your week.
Department of Energy Hacked — Again --
Although the grid is supposed to be “critical infrastructure” as...more

The U.S. government can get historical cell phone records, including geolocational information, from cell phone providers without a warrant, the Fifth District Court of Appeals ruled.
The appellate court reversed the trial...more

Cyber-attacks by both private actors and nation states against US critical infrastructure and individual communications users are on the rise. In Washington, DC, policy makers are increasing their focus on cyber threats on...more

In recent months, federal and state governments have taken an increasingly active role in reviewing cybersecurity issues within the private sector. There has been a flurry of activity as different government bodies discuss...more

Cybersecurity initiatives are moving rapidly within the federal government and require owners and operators of critical infrastructure – including in particular Communication and Energy Systems, and those who supply and...more

On April 18, 2013, the Federal Energy Regulatory Commission (“FERC”) issued a notice of proposed rulemaking (the “NOPR”) stating that it intends to approve Version 5 of the Critical Infrastructure Protection (“CIP”)...more

*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.